Cyber Security Awareness and Vulnerabilities Blog

RSS

You can have all the tools in place: firewalls, security programs, routinely updated passwords and security team members. But that still might not be enough. We advocate for increased employee security awareness trainings as well as maintaining the patches and updates required for programs…

Read More

A great deal of time and effort can be saved during management reviews and audits by using an Intelligent IAM solution to provide reports, including filtering and drill-down capabilities, trend information, and data visualization tools. These not only give managers a high-level view…

Read More

As with most anything in life, you want to set SMART goals. Setting goals that follow this guideline (Specific, Measurable, Achievable, Relevant and Time-bound) allows you to form hypotheses and set firm parameters around your work and what potential outcomes to expect. This…

Read More

Before I start, I need to come clean and tell you that I love enterprise software. Weird? Maybe. However, after working in the industry for many years and for many different companies, enterprise software is the basis for what drives business. Whether it’s…

Read More

We're always trying to simplify how you go about pen-testing your organization. Anytime you make something too complicated there becomes unnecessary barriers to completion. Enjoy this free Guide to Penetration Testing to ensure you complete your penetration tests quickly and efficiently.

Read More

Boston Children's Hospital needed help. One of the largest pediatric medical centers in the US, Boson Children's Hospital treats 30,000 patients each year. As a teaching hospital, they also received 500 new interns, twice a year and had the challenge of provisioning access rights…

Read More

I recently was watching an old episode of “Friends”. During this one particular episode, Ross was trying to move a couch into his upstairs apartment. As they were trying to carry the couch upstairs, they reached a point where they had to turn…

Read More

Internships are becoming more and more necessary in order for college students to land a job straight out of college. In fact, over 85% of college students complete internships every year. With numbers like these, it’s quite possible that you have a few…

Read More

Don’t be misled into thinking that because you have a Penetration Tester that you have a Red Team – or that because you have a Red Team you have a Penetration Tester. While some functions may overlap, you are getting two different things…

Read More

In a recent survey of LinkedIn users, privileged users pose the biggest threats to an organization (60%), followed closely by contractors and consultants (57%) and regular employees (51%). This shows us that our access credentials are more valuable than ever which means that being…

Read More